Estimated Reading Time: 5 minutes In this blog, we explore how scammers are having success phishing on SMS/messaging and chat apps, as well as social media platforms. Learn how to mitigate threats.
Estimated Reading Time: 8 minutes This blog explores considerations and criteria for evaluating a URL database or classification technology partner that shares your commitment to success. We’ve outlined the important considerations and criteria for performing an evaluation of web filtering technologies. Protection, coverage, and accuracy are most important—but we’ll also show you how to prepare test URLs so that you can confidently compare multiple solutions and save time.
Estimated Reading Time: 4 minutes The purpose of this article is to provide a quick and easy visual reference the web filtering market segments and to identify where various services are positioned in the market and on the value curve.
Estimated Reading Time: 6 minutes In this blog, we explore the category updates that require real-time protection as well as how we deliver instant updates to URL databases worldwide.
Estimated Reading Time: 5 minutes Search functionality is nearly ubiquitous in our home and business services and devices making safe search more important than ever before. In this post, we explore how service providers and cable operators can implement safe search filters and guards to protect users from objectionable content.
Estimated Reading Time: 5 minutes Ransomware is so 2017. Today, targeted phishing poses the most significant risk. But how did we get here and what’s next for AI-based Phishing Detection.
Estimated Reading Time: 9 minutes In this blog, we explore the growing safety concerns and impacts of unsafe and unsecured search technology. Originally designed to provide fast and easy searching of nearly unlimited content—it now creates significant safety problems and often aggregates the web’s worst content.
Estimated Reading Time: 7 minutes We’re only just beginning to understand how mass data surveillance systems and data privacy impacts us. Will GDPR-like regulation come to the U.S. in 2019? It will require time to craft legislation, achieve some level of adoption, and put it up for a vote—but what’s next?
Estimated Reading Time: 8 minutes This blog covers DNS basics, advantages, limitations, and scalability insights for how DNS filtering contributes to a strong, scalable security foundation.
Estimated Reading Time: 6 minutes Unfortunately, protecting yourself against malicious threats online is constant battle in this day and age. Security researchers and media outlets have a seemingly never-ending list of topics and events to cover—driving a constant pressure and awareness that we’re not safe online.